Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Medical Doctor's HIPAA compliant email, manage PHI and voice transcription. Collaborate with Instant Messaging, File Sharing and Private Message Boards. Send and Receive secure email, share documents and patient information. HIPAA and GLBA compliant. Works across networks and firewalls without a need for expensive VPN, PKI or complicated network setup and maintenance.
  • SafeHouse provides total privacy and protection for your sensitive files and folders using passwords and strong encryption. SafeHouse features military-strength encryption which is completely transparent to the way you work and compatible with all Windows applications. This software is amazingly simple to use and works on all drives, including external USB devices, memory sticks and CD/DVDs. SafeHouse also supports saving passwords to smartcards.
  • SafeHouse provides total privacy and protection for your sensitive files and folders using passwords and strong encryption. SafeHouse features military-strength encryption which is completely transparent to the way you work and compatible with all Windows applications. This software is amazingly simple to use and works on all drives, including external USB devices, memory sticks and CD/DVDs. SafeHouse also supports saving passwords to smartcards.
  • Protect your computer from all kinds of threats, from snooping co-workers and bad guys to your pet or toddler! Computer Lock Up offers you a powerful tool to lock your PC when leaving it and prevent any unauthorized access. Set the unlock password that cannot be bypassed in safe mode or ignored by a user with administrative rights. The smart software locks keyboard shortcuts, mouse, CD/DVD drives and screen, and closes all the security loopholes.
  • Creates a virtual encrypted disk within a file and mounts it as a real disk. Supports Smartcards and Software Certificates
  • WinTweakz PrivacyGuard guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC. You can safely clean your activity traces on your PC.
  • FlyingBit Password Keeper offers a simple solution for the problem of remembering a lot of confidential information. For example, it may include passwords, serial numbers and all kinds of codes. Data is stored in a special encrypted database. Thus, even if someone gains access to the storage, it will be impossible to read information from it.
  • Keylogger (Keyboard spy) version Lite is the software product for PC, developed by CKM SYSTEMS as the cheapest solution on the software market for end users. This product is suitable first of all for people whose work is connected with huge data amount that can be restored anyway regardless of whether it was saved or just typed. KeyLogger is the software for parental control purposes recording all keystrokes You type on the keyboard and saving it into Keylogger LogFile. More advanced keylogger modifications can also send the logged text and additionally collected information to your E-mail address. KeyLoggers are useful for not loosing your data that often happens when computer hangs up. Also the software records the LogFile of all programs starts, remembers Internet addresses and search engines queries that is very useful for Keylogger usage by parents on home computers. The keylogging software interacts with the clipboard. Keylogger Lite key parameters: Memorization of each keystroke Friendly soft ...
  • Software that remembers your password for unlimited programs. This software also remembers other important information like your usernames. Never forget your passwords again!
  • Protect your data and privacy and remove all evidence of your computer and online activity with ChristmasTree Privacy Tools, Web pages, pictures, unwanted cookies, chat room conversations, and all traces of files
  • Any program which you install adds items to the Start Menu and the Add/Remove Programs List in the Control Panel. Using this Control Panel applet, anyone who has access to your computer can view which programs you have installed on your PC and un-install them. Hide Programs lets you hide programs from the Add/Remove Programs List or re-show them. You can also temporarily hide Start Menu items without deleting them.
  • SpyKing Invisible Spy software secretly logs Facebook activities, keystrokes, chats, emails, web sites, Microphone, PC games, online searches, shopping records, webmails, documents opened, user names, passwords and more. It takes screenshots like a hidden surveillance camera. SpyKing Invisible Spy is completely invisible to computer users. People won't know its existence. You can receive reports remotely via emails or ftp like every 60 minutes.
  • This little program wipe file(s) and folder secure. Support the following method: Single overwrite with Zeros and pseudoram, RCMP..DoD wipe: US Department of Defense of Defense 5220.22 compliant wiping) and Gutmann's Maximum Security 35 pass wiping method. This program support DRAG&DROP. FREEWARE
  • This professional data wiping solution deletes files, drives, partitions and overwrites free space without the possibility of data recovery. It supports up-to-date wiping algorithms like DoD 5220.22, Gutman, Bruce Schneier, Single Pass, VSITR and custom pattern. Designed for professional use, it supports batch wiping and digital signed log files, which are required to legally proof the wipe process. DataErase is easy to use, fast and reliable.
  • Keystroke monitoring tool record all typed keystroke activities including sent mails, passwords, clipboard activities, accessed website, voice chat conversation, internet usage in efficient and effective manner. PC activity tracker tool has the ability that helps you to watch on your child, spouse and employees online activities those are performed on your computer system in your absence. Invisible Computer monitoring tool is compatible with all Windows operating system including Windows Vista, XP, 2000, 2003, 98 etc. Keystroke recording utility runs as background process and helps to establish full control over computer without getting know by current user. Key stroke monitor tool is password protected that prevent unauthorized user to change its configuration setting. Keystroke recording tool capture screenshots of all accessed activities, which can help its users to sort out several computer errors. Remote monitoring tool is not visible in program files, add/remove program, task manager because of its invi ...
  • Automatically lock your computer with a username and password at specified intervals. Locks can be set to occur every 30 minutes, 1 hour, 24 hours, etc. This application sits in the system tray at the bottom right corner of the screen.
  • Restrict PDF program is one of the best utility to prevent pdf copying or to prevent PDF from being copied. With Prevent PDF Copying users can prevent PDF files quickly & easily with a few clicks of mouse. The program allow users to set PDF password &; apply PDF restrictions on PDF files of Acrobat version up to 9 so that users can prevent PDF copying. Now use Restrict PDF program and prevent PDF copying in instant steps.
  • ID Install Watch is a fast and accurate program meant to oversee the functioning of an installation and to monitor the removal of software or hardware. It documents the changes occurring during the installation process and makes necessary configuration changes. Main features includes: overseing of all installation processes, monitoring registry, deletions or modifications.
  • Parental Control PRO is a stealth application that can secretly record information on your PC: records websites visited, usernames, passwords, screenshots, incoming and outgoing emails, both sides of chat conversations and more. Parental Control PRO allows you to specify what days and hours your children may access the computer, internet, or any game and application on your system!
  • Protecting your computer from malicious attacks over the Internet is essential and an anti-virus program alone is simply not enough. An intrusion prevention system such as DefenseWall Personal Firewall will completely solve the problem of infection by malicious software. However, unlike other solutions, this is the world's first sandbox firewall, designed to be easy to use and requiring no complicated setup or configuration process.
  • This program is for real time monitoring of users activities on network computers and for employees' work time tracking. It monitors usage of all office computers in a network. You can see keystrokes, remote screen, Internet history and used programs. Send instant messages, copy files from a remote PC and control them. It can record every email and IM sent and received. Recordings are securely kept in Central Log Database on the main computer.
  • Protect your privacy and your identity with automatic wiping of sensitive information. Remote wiping, untrusted SIM deletion, wiping on SMS - enjoy SecuWipe allround protection. This can be your last but most efficient shield when the device gets into intruder's hands.
  • SpyPal Windows Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. Use hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.

Page 28 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware